Solved

tasks of security and network administrators.

Posted on 2011-03-22
2
281 Views
Last Modified: 2012-05-11
Hi
deal i need the daily tasks in detail that any security administrator also network administrator should do as a part for his job.
security admin he maintain the firewalls, IPSs, Sidewinder proxies.
network admin he maintain the routers, switches and links providers.

cheers.
0
Comment
Question by:besmile4ever
2 Comments
 
LVL 33

Accepted Solution

by:
MikeKane earned 500 total points
ID: 35198807
For security best-practice, you would normally segregate duties such that the network admin would implement and maintain, the security admin sets policy and reviews implementation and ongoing operation.  

For example: A security admin evaluates a system or is told by an auditor that you need to implement complex passwords for everyone in windows domain.      THe security admin would write a policy (i.e. all password should have a mix of upper/lower and be changed every 45 days with 3 failed tries resulting in a 1 hour lockout, and it should record failed attempts).    After approval, the sec admin gives the policy to the network admin to implement.    The network admin would decide how to best implement the policy.   Maybe its AD policy, maybe some other 3rd party.   The Sec admin would then review the implementation to be sure it matched the policy, then ask for a weekly report of lockouts for review.    


This type of flow would be used for any project.    Sec admin sets the direction and policy but stays hands off of the adminstration and implementation.    THe network team would setup the system following the guidelines set forth by the sec admin.       The Sec admin would review the implementation and review the logs as needed.  

Thats my 2 cents.
0
 

Author Closing Comment

by:besmile4ever
ID: 35407066
thnks.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Why does my public IP keep changing? 6 64
MS hosted exhange security 2 35
Use of vpn-filter value  in S2S VPN 2 35
CSS: Making Pure CSS read more boxes thinner 5 31
With healthcare moving into the digital age with things like Healthcare.gov, the digitization of patient records and video conferencing with patients, data has a much greater chance of being exposed than ever before.
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question